Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Cyber Crime

The increasing integration of web technologies in everyday life, along with the popularity of social
networks and the development of mobile technology, contribute to the creation of an optimal
environment for various types of cybercrime and the dissemination of illegal Internet content. Both
children and teenagers represent not only the most avid users of new technologies and functionalities,
but also the most naïve segment of the population. The general public is also not sufficiently aware of
the severity of the problem

his is any crime that involves computer and a network.


In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert

     


  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
his is any crime that involves computer and a network.
In some cases, the computer may have been used in order
to commit the crime and in other cases the computer may
have been the target of the crime. The oxford reference online
    
  

 
that is committed by means of special knowledge or expert
     
  



  
 
  
     
   
criminal activity in which information technology systems are
the means used for the commission of the crime
This is any crime that involves computer and a network. In some cases, the computer may have been
used in order to commit the crime and in other cases the computer may have been the target of the
crime. The oxford reference online that is committed by means of special knowledge or expert criminal
activity in which information technology systems are the means used for the commission of the crime

In addition to its many benefits, the Internet increases users’ exposure to various forms of crime.
Indeed, the Internet has given rise to certain criminal offenses that were unimaginable or didn’t exist in
the past. Levels of privacy have decreased substantially as the Internet-using public’s willingness to
publish personal information has increased. Once something is posted on the Internet it can never be
erased, a fact that the general public, and children and teenagers in particular, easily forget.
Furthermore, fraud and scams are designed to take advantage of the virtual environment in which
boundaries and time are irrelevant. Young Internet users should be made aware of the threats to their
identity and assets, as well as the potential future ramifications of their activities on the Internet.
Furthermore, core rules of etiquette in the virtual environment should be communicated to all users.
Through raising the level of awareness of our children now, we will be moving toward the creation of an
information-secure culture in the future.

The training that social workers receive provides them with a unique skill set to tackle cybercrime in a
comprehensive way. Their study of social behavior provides them with a deeper understanding of both
bullies and their targets, making social workers especially capable of designing effective anti-bullying
programs using evidence-based methods to alter behavior. In addition, their clinical training and
counseling experience makes them well equipped to provide support to those who have been bullied.
Finally, their schooling in advocacy, leadership and staff development positions them to educate their
schools and communities about the best approaches to handling bullying.

In order to successfully address the issue of cybercrime, it is important to implement successful


preventive techniques in all target groups. Therefore, we concluded that continuous education plays an
important role in raising the awareness of all users and in encouraging them to implement preventive
techniques in everyday life. In order to evaluate the effects of the educational module implementation,
an evaluation will be performed following the conclusion of each educational module. Through
implementation of these educational modules targeting the youngest Internet users, we will be making
the first step toward the creation of an information security culture.

You might also like